[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Recommended reading: Authentication in Distributed Systems
You can find an abstract for
"Authentication in Distributed Systems: Theory and Practice" at
http://gatekeeper.dec.com/pub/DEC/SRC/research-reports/abstracts/src-rr-083.html
together with a pointer to the postscript for the complete paper...
Cheers,
Ron Rivest
==============================================================================
Return-Path: <jpp@software.net>
X-Sender: jpp@mail.software.net
Mime-Version: 1.0
Date: Thu, 29 Feb 1996 22:15:22 -0800
To: rivest@theory.lcs.mit.edu (Ron Rivest)
From: John Pettitt <jpp@software.net>
Subject: Re: BAN logic
Do you know if either paper is available for ftp or on the web ?
Thanks
John
At 08:48 PM 2/29/96 EST, you wrote:
>
>I just want to second Joe Tardo's recommendation of the Burrows, Abadi,
>Needham paper ("A logic of authentication", ACM TOCS, Feb. 1990).
>
>Another closely related paper:
>
>@article{LampsonAbBuWo92,
>author = {Butler Lampson and Mart\'in Abadi and Michael Burrows
> and and Edward Wobber},
>title = {Authentication in Distributed Systems: Theory and Practice},
>journal = {TOCS},
>month = Nov,
>year = 1992,
>volume = 10,
>number = 4,
>pages = {265-310}
>}
>
>is also excellent and well worth reading. I'd consider theese papers
>as ``must'' background readings for this group...
>
> Cheers,
> Ron Rivest
>
>
--
John Pettitt
email: jpettitt@well.sf.ca.us (home)
jpp@software.net (work)